File _patchinfo of Package patchinfo.32471
<patchinfo incident="32471">
<issue tracker="bnc" id="1216922">VUL-0: CVE-2023-5678: openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow</issue>
<issue tracker="bnc" id="1219243">VUL-0: CVE-2024-0727: compat-openssl098,openssl,openssl-1_0_0,openssl-1_1,openssl-1_1-livepatches,openssl-3,openssl1: openssl: denial of service via null dereference</issue>
<issue tracker="cve" id="2023-5678"/>
<issue tracker="cve" id="2024-0727"/>
<packager>ohollmann</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for openssl</summary>
<description>This update for openssl fixes the following issues:
- CVE-2024-0727: Denial of service when processing a maliciously formatted PKCS12 file (bsc#1219243).
- CVE-2023-5678: Denial of service via long X9.42 DH keys (bsc#1216922).
</description>
</patchinfo>